Editor's Note

Give a Paradigm Shift

SOME years ago, while working for the Air Force, a cool new word appeared. At least it was new to me. Paradigm. Back in the late 1980s, the Air Force began a paradigm shift to improve the way it conducted business. Instead of settling for average productivity, average business partners and average products, the Air Force would improve the quality of business all around.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

The Air Force is in the business of protecting our homeland and securing our freedom. Nonetheless, a paradigm shift was underway to employ a quality product by quality employees.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

Convergence is out, and interoperability is in.

That's right ... interoperability is the new paradigm shift.

While attending the 2006 Convergence & Campus Security Forum, sponsored by ADT, I learned plenty about technology and convergence, and if I use the word convergence too many times, feel free to substitute interoperability at will.

While conversing with the media, ADT's vice president of worldwide marketing Jamie Haenggi pointed out there is a two-pronged convergence phenomenon. Within product evolution, physical security devices become IP-enabled and ride on corporate networks, and the connectivity opens up significant new application opportunities, including business operations. She also said the theme of the convergence of physical and logical security blends common solution elements that emerge across physical security and MIS applications.

Within the customer dynamics of IT-enabled physical security, IT becomes an influencer, driver or co-owner. She said traditional security owners must engage with IT, which is often counter cultural. As you can image, there is a bit of tension between IT, physical security and preferred suppliers. The convergence of physical and logical security means the CIO becomes the solution architect, IT integrators' value proposition becomes more compelling, and the potential of a chief security officer owning all of the security now becomes a viable option.

The implications of convergence will require industry standards and regulations to adopt to rapid technology changes, and according to Haenggi, the implications of convergence trends also will redefine the traditional security space.

Because of convergence, or interoperability, there will be new decision makers and a commoditization of products. Security will improve its position in the value chain and will become more defined.

Haenggi said the convergence issue will leverage IT infrastructure for efficiency, mass storage and bandwidth, and it will allow customers to think more globally. Not that the economy isn't a global platform now, but new decision makers and influencers will take security into other areas such as merchandising, business operations and compliance.

See what I mean? We're standing at the security line of scrimmage and an audible is coming. Things are about to change. The changes will happen so quickly it may appear as though they've always been part of the infrastructure.

According to ADT's new COO John Koch, the traditional security market is undergoing significant changes which carry important implications for its North American operations. He said that his clients, the decision makers of their respected corporations, are shifting to CIOs and business leaders. Koch also said the technology evolution means a dual convergence of physical security and IT. This means that security devices are becoming IP-enabled, as well as the integration of physical and logical security.

All this means that technology advancements are creating new business opportunities in the data world and in business analytics. Traditional security products and services are being substituted by new technologies, and several vertical-specific technologies and applications are emerging.

The landscape also is changing in the competitive world of security. IT product companies, such as Cisco Systems, are entering the physical security marketplace. The industry also is watching system integrators move into security such as Accenture, IBM and TechData. There also will be many security product manufacturers making integrated products, such as GE Security, and there will be security players building IT and vertical-specific capabilities such as Red Hawk and Stanley Security. Red Hawk, however, has been acquired, or to be more specific at the time of this writing, is part of an acquisition agreement with United Technologies. This type of strategic acquisition melds electronics solutions such as video surveillance to physical equipment, such as safes, vaults and ATMs. UTC enhances its holdings as a fire safety and security solutions provider as a diversified company providing high technology products and services to the building and aerospace industry.

Koch, who is relatively new at ADT, comes to the multi-billion dollar company from the telephony world, expecting an era of convergence that continues with growth on both the top and bottom line. He said it's not likely that ADT will jump into the manufacturing industry, but I wouldn't bet against it. He does plan to grow the authorized dealer program, and part of his five-year interoperability plan is to seek convergence growth quickly, remain a leading provider of security services and see that the company drives the technology vehicle.

ADT will call an audible, but not one that is unexpected. Global growth, which every company in the world is seeking, is at the center of Koch's plans. He is quick to point out that China is at an epicenter of growth in the monitoring business, though he expects growth in the Middle East, Africa and Europe.

The paradigm shift is pretty clear at ADT. Plans for interoperability call for a continued, but more focused, worldwide development. The company's business model of having call centers that cover for one another, if needed, may be the perfect operating platform in a global marketplace -- I hope the employees in Denver can speak Mandarin.

This article originally appeared in the October 2006 issue of Security Products, pg. 6.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.